securitybytes.blogspot.com
Security Bytes: March 2010
http://securitybytes.blogspot.com/2010_03_01_archive.html
Computer security news tips and general computer advise. If you have a computer related question please post a comment or e-mail me and I will try to answer you the best that I can. Thursday, March 25, 2010. Common Threats and Safeguards to Be Aware of. A Denial of Service Attack (DoS). Are very common as more people are being connected. You can have spam, phishing, and malware sent though e-mail. How do you safeguard against these types of attacks? Links to this post. Saturday, March 20, 2010. The Linux...
securitybytes.blogspot.com
Security Bytes: December 2010
http://securitybytes.blogspot.com/2010_12_01_archive.html
Computer security news tips and general computer advise. If you have a computer related question please post a comment or e-mail me and I will try to answer you the best that I can. Sunday, December 5, 2010. Social Culture of Hackers. A couple of well known hacker underground sites include:. Http:/ forums.hackerscenter.com/index.php. Http:/ www.hacker.org/. Http:/ www.2600.com/. Http:/ www.defcon.org/. Most of the hacker community never meets face-to-face. They hang out on irc, chat sites, and IM. Hacker...
neoisf.org
Northeast Ohio Information Security Forum
http://www.neoisf.org/2014/11
Northeast Ohio Information Security Forum. November 19, 2014. NEOISF November 19, 2014 Meeting. NORTHEAST OHIO INFORMATION SECURITY FORUM MEETING. Wednesday November 19, 2014. 6:30 PM 8:00 PM. Pizza and social start 6:00 PM. Location: Freedom Square III at 4511 Rockside Rd.,. Off Rockside Road, Independence, Ohio. Open to everyone and free as always. The Northeast Ohio Information Security Forum will hold our monthly. Meeting at the above date and time. Come Share Your Ideas! We are at F.
neoisf.org
Northeast Ohio Information Security Forum
http://www.neoisf.org/memberships
Northeast Ohio Information Security Forum. February 10, 2010. Free to join at no cost to you, and open to anyone who meets the. Has strong interest in information and/or physical security. Provides a name, email address, and title. This will not be shared outside of the group. To join visit to the following link and enter your contact information:. Comments Off on Membership. Posted by relik @ 4:58 am. Feed for comments on this post. Sorry, the comment form is closed at this time.
neoisf.org
Northeast Ohio Information Security Forum
http://www.neoisf.org/2014/04
Northeast Ohio Information Security Forum. April 15, 2014. Meeting – April 16, 2014: Location 4511 Rockside Road. NORTHEAST OHIO INFORMATION SECURITY FORUM MEETING. Wednesday April 16, 2014. 6:30 PM 8:00 PM. Pizza and social start 6:00 PM. Reedom Square III at 4511 Rockside Rd.,. Off Rockside Road, Independence, Ohio. Open to everyone and free as always. The Northeast Ohio Information Security Forum will hold our monthly. Meeting at the above date and time. We are at F. Map to the Location.
securitybytes.blogspot.com
Security Bytes: July 2011
http://securitybytes.blogspot.com/2011_07_01_archive.html
Computer security news tips and general computer advise. If you have a computer related question please post a comment or e-mail me and I will try to answer you the best that I can. Sunday, July 24, 2011. I just finished reading a new book from some of the guys at Offensive. Metasploit: The Penetration Tester's Guide. And all I can say is that it is amazing. Be sure to check it out and get yours from Amazon.com. Or your favorite bookseller. Overall I give this book a 4 out of 5 stars only because I wish ...
securitybytes.blogspot.com
Security Bytes: May 2013
http://securitybytes.blogspot.com/2013_05_01_archive.html
Computer security news tips and general computer advise. If you have a computer related question please post a comment or e-mail me and I will try to answer you the best that I can. Sunday, May 5, 2013. Customizing Windows 8 Tips. Why buy a Windows 8 machine only to get rid of the Modern Interface. Lock Screen Apps: While we are customizing our lock screen we might as well provide some useful information. While the screen is locked you can also tell how much battery is left, the time, number emails a...
securitybytes.blogspot.com
Security Bytes: Gray Hat Hacking 3rd Edition Review
http://securitybytes.blogspot.com/2011/06/gray-hat-hacking-3rd-edition-review.html
Computer security news tips and general computer advise. If you have a computer related question please post a comment or e-mail me and I will try to answer you the best that I can. Friday, June 10, 2011. Gray Hat Hacking 3rd Edition Review. I have just finished reading Gray Hat Hacking: The Ethical Hacker's Handbook 3rd Edition. By: Shon Harris. The book has been updated and expanded with new content and expended chapters and techniques. The chapters on Malware Analyst is excellent. It builds on the...
securitybytes.blogspot.com
Security Bytes: Customizing Windows 8 Tips
http://securitybytes.blogspot.com/2013/05/customizing-windows-8-tips.html
Computer security news tips and general computer advise. If you have a computer related question please post a comment or e-mail me and I will try to answer you the best that I can. Sunday, May 5, 2013. Customizing Windows 8 Tips. Why buy a Windows 8 machine only to get rid of the Modern Interface. Lock Screen Apps: While we are customizing our lock screen we might as well provide some useful information. While the screen is locked you can also tell how much battery is left, the time, number emails a...
securitybytes.blogspot.com
Security Bytes: April 2010
http://securitybytes.blogspot.com/2010_04_01_archive.html
Computer security news tips and general computer advise. If you have a computer related question please post a comment or e-mail me and I will try to answer you the best that I can. Thursday, April 8, 2010. Risk Analysis Life Cycle. Identify the Risk: Determine your assets and identify threats that are likely to attack those assets. Assess the Risks: Determine the asset value. Produce a risk matrix to determine which risk is greater given the company’s environment. Links to this post. The Mike Tech Show.